[{"command":"settings","settings":{"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxPageState":{"libraries":"eJwry0wtL9YvA5F6ufkppTmpOmBOfGJWYkV8emqJPowBFc_MS8vMyyxJjS9OLsrPyYFo1YWJ6kJEAdF1Ikc","theme":"cfr_theme","theme_token":null},"ajaxTrustedUrl":[],"views":{"ajax_path":"\/views\/ajax","ajaxViews":{"views_dom_id:e84dc9c8bffee48aff2d35a691cabef75490eb603959fda07403c059eca28fe4":{"view_name":"blog_posts","view_display_id":"block_archived_blog_posts","view_args":"17\/253132\/2014","view_path":"\/custom\/ajax\/archived_blog_posts\/17\/253132\/2014","view_base_path":null,"view_dom_id":"e84dc9c8bffee48aff2d35a691cabef75490eb603959fda07403c059eca28fe4","pager_element":0}}},"viewsAjaxGet":{"blog_posts":"blog_posts"},"user":{"uid":0,"permissionsHash":"e331052eb0a1bc4b2feb3d0cfc1f0f2f6ec5dfd9a50125d1397e4ccee31da7be"}},"merge":true},{"command":"add_css","data":[{"rel":"stylesheet","media":"all","href":"\/sites\/default\/files\/css\/css_sgviVl_37H6Ta5Bl-lc7uAkjneU0Dj6JvASOxbgV9L8.css?delta=0\u0026language=en\u0026theme=cfr_theme\u0026include=eJwry0wtL9YvA5F6ufkppTmpOmBOfGJWYkV8emqJPowBFc_MS8vMyyxJjS9OLsrPyYFo1YWJ6kJEAdF1Ikc"}]},{"command":"add_js","selector":"body","data":[{"src":"\/themes\/custom\/cfr_theme\/node_modules\/jquery\/dist\/jquery.min.js?v=3.1.0"},{"src":"\/themes\/custom\/cfr_theme\/node_modules\/jquery-migrate\/dist\/jquery-migrate.min.js?v=3.1.0"},{"src":"\/core\/assets\/vendor\/once\/once.min.js?v=1.0.1"},{"src":"\/core\/misc\/drupalSettingsLoader.js?v=10.2.11"},{"src":"\/core\/misc\/drupal.js?v=10.2.11"},{"src":"\/core\/misc\/drupal.init.js?v=10.2.11"},{"src":"\/core\/assets\/vendor\/tabbable\/index.umd.min.js?v=6.2.0"},{"src":"\/core\/misc\/progress.js?v=10.2.11"},{"src":"\/core\/assets\/vendor\/loadjs\/loadjs.min.js?v=4.2.0"},{"src":"\/core\/misc\/debounce.js?v=10.2.11"},{"src":"\/core\/misc\/announce.js?v=10.2.11"},{"src":"\/core\/misc\/message.js?v=10.2.11"},{"src":"\/core\/misc\/ajax.js?v=10.2.11"},{"src":"\/themes\/contrib\/stable\/js\/ajax.js?v=10.2.11"},{"src":"\/modules\/contrib\/views_ajax_get\/views_ajax_get.js?su6ep6"},{"src":"\/core\/assets\/vendor\/jquery-form\/jquery.form.min.js?v=4.3.0"},{"src":"\/core\/modules\/views\/js\/base.js?v=10.2.11"},{"src":"\/core\/modules\/views\/js\/ajax_view.js?v=10.2.11"},{"src":"\/modules\/contrib\/views_infinite_scroll\/js\/infinite-scroll.js?v=10.2.11"}]},{"command":"insert","method":"html","selector":".blog-series__accordion-item[data-year=\u00222014\u0022] .blog-series__accordion-body","data":"\u003Cdiv class=\u0022views-element-container\u0022\u003E\u003Cdiv class=\u0022js-view-dom-id-e84dc9c8bffee48aff2d35a691cabef75490eb603959fda07403c059eca28fe4\u0022\u003E\n \n \n \n\n \n \n \n\n \u003Cdiv data-drupal-views-infinite-scroll-content-wrapper class=\u0022views-infinite-scroll-content-wrapper clearfix\u0022\u003E\n\n\n\n \u003Cdiv class=\u0022views-row\u0022\u003E\n \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n Cybersecurity\n \u003C\/a\u003E\n \u003C\/div\u003E\n \n \u003Ca href=\u0022\/blog\/top-five-cyber-policy-developments-2014-year-corporate-cyberattacks \u0022 class=\u0022card-article-large__link\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n The Top Five Cyber Policy Developments of 2014: A Year of Corporate Cyberattacks\n \u003C\/div\u003E\n \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n \n \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2014\/12\/anonymous-hackers.jpg.webp)\u0022\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/a\u003E\n\n \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003E\u003Cem style=\u0022color: #222222;\u0022\u003EOver the next few days,\u00a0\u003C\/em\u003ENet Politics\u003Cem style=\u0022color: #222222;\u0022\u003E\u00a0will countdown\u00a0the top five developments in cyber policy of 2014.\u00a0Each policy event will have its own post, explaining what happened, what it all means, and its impact on\u00a0cyber policy in\u00a02015. In this post, corporate cyberattacks.\u003C\/em\u003E\n\n\u003Cem\u003ESharone Tobias is the research associate for Asia studies and the\u00a0\u003Cem style=\u0022color: #222222;\u0022\u003EDigital and Cyberspace Policy program at the Council on Foreign Relations.\u003C\/em\u003E\u003C\/em\u003E\n\nWhile Sony may have dominated the news towards the end of 2014, three major cyberattacks against U.S. companies shook the corporate world earlier this year:\u00a0Target\u00a0opened the year by announcing in January\u00a0that hackers had stolen personal information from an estimated 110 million accounts; hackers accessed approximately 83 million J.P. Morgan Chase accounts in August; and Home Depot confirmed that its payment system was breached in September, compromising an estimated 56 million accounts. Here\u2019s a look back at the details of each of those attacks, and how they affected the conversation about cybersecurity in the United States and the corporate sector.\n\n\u003Cstrong\u003ETarget\u003C\/strong\u003E\n\nTarget announced in January that hackers had stolen data\u2014including names, mailing addresses, phone numbers, and email addresses\u2014from over 70 million shoppers, and the credit card information of 40 million shoppers. 1 to 3 million of those credit cards were then sold on the black market, raising an estimated\u00a0$53.7 million for the hackers. The attack caused enormous damage to Target\u2019s reputation and stock prices, resulting in the resignation of Beth M. Jacob, the company\u2019s most senior technology officer in February, and\u00a0Gregg Steinhafel, CEO and chairman of the board, in May. Target executives were\u00a0summoned to appear before\u00a0congressional panels\u00a0about data privacy, and executives admitted that they had missed certain warning signs about security gaps. Experts say that Target left itself\u00a0particularly vulnerable\u00a0to attack, ignoring memos circulated by the federal government and research firms suggesting that new malware was targeting Target\u2019s payment system, allowed too much access to vendors, and did not do enough to wall its payment system off from the rest of its network.\n\nThe attack cost Target\u00a0$148 million, and cost financial institutions $200 million, according to the Consumer Bankers Association and the Credit Union National Association. The company announced a timetable to\u00a0move its debit and credit cards\u00a0to a\u00a0chip-and-pin system, widely used in Europe but still rare in the United States. The chip-and-pin system is considered more secure than credit cards that rely on magnetic strips, and the move will cost Target $100 million. The company also spent $61 million in anti-breach technology in the months following the cyberattack, and profits fell 46 percent in the fourth quarter of 2013.\n\n\u003Cstrong\u003EJ.P. Morgan Chase\u003C\/strong\u003E\n\nIn August, the networks of several banks, most prominently J.P. Morgan Chase, were infiltrated by a network of hackers who accessed checking and savings account information. The attack went unnoticed for two months over the summer. J.P. Morgan estimated that 76 million households and 7 million small businesses accounts were affected by the attack, although hackers weren\u2019t able to access the most private data like Social Security or account numbers. Experts believe that\u00a0Russian criminals were behind the attack. However, the origin of the attack is still far from settled, though the FBI officially ruled out the Russian government as a perpetrator.\n\nUltimately, though the infiltration was one of the largest known cyberattacks against a financial institution, the J.P. Morgan attack\u00a0did not cost consumers much money. The data accessed was more related to J.P. Morgan\u2019s marketing functions than banking functions. Even so, that kind of information allows hackers to write more effective spearphishing emails to trick Chase customers into giving out information. However, a recent report argues that the despite J.P. Morgan\u2019s $250 million budget on cybersecurity, hackers were able to access the company\u2019s servers because the security team had\u00a0neglected to add two-factor authentication, an extra layer of security used by most big banks. This oversight might explain why other institutions targeted by the same hackers did not suffer nearly as large of an intrusion.\n\n\u003Cstrong\u003EHome Depot\u003C\/strong\u003E\n\nHome Depot confirmed in September that they had been infiltrated by hackers since April, admitting that 56 million accounts were put at risk, more than Target\u2019s 40 million accounts. The company expected to pay $62 million to cover the costs of the attack, including legal fees and overtime for staff, and causing an estimated $90 million in costs for banks to replace 7.4 million debt and credit cards. Unnamed staff within Home Depot said that the company\u2019s information security department\u00a0struggled with high turnover and old software. The team resisted using the Endpoint security feature of Symantec\u2019s cybersecurity program, a feature that tracks and alerts system administrators of suspicious activity, despite the urging of security consultants. The company also did not encrypt customer card data until September 2014.\n\n\u003Cstrong\u003EThe Takeaway\u003C\/strong\u003E\n\nTarget, J.P. Morgan, and Home Depot were only three of many victims of cyberattacks in 2014; Staples, Healthcare.gov, Neiman Marcus, and many others also suffered cyberattacks that left customers vulnerable. Several similarities stand out between these and the Sony attack. First, in these attacks, the division of responsibility for the costs and defense is not clear. Even in the case of Home Depot and Target, where lapses in security were mainly the fault of retailers, financial institutions bore the brunt of the cost. Second, the attacks show the necessity of protecting the weakest links and access points, such as through vendor networks.\u00a0Finally, and perhaps most surprisingly, customers just don\u2019t seem to care that much about the security of their data\u2014only a few months after these attacks, stock prices and sales returned to normal at Home Depot and Target.\u003C\/div\u003E\n \n \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n \u003Cspan class=\u0022card-article-large__publication-type\u0022\u003EPost\u003C\/span\u003E\n \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Guest Blogger for Net Politics\u003C\/span\u003E\n \n \n \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 30, 2014\u003C\/span\u003E\n \n \n \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n Net Politics\n \u003C\/a\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022views-row\u0022\u003E\n \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n \u003Ca href=\u0022\/asia\/china\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n China\n \u003C\/a\u003E\n \u003C\/div\u003E\n \n \u003Ca href=\u0022\/blog\/top-five-cyber-policy-developments-2014-chinas-great-leap-forward \u0022 class=\u0022card-article-large__link\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n The Top Five Cyber Policy Developments of 2014: China\u2019s Great Leap Forward\n \u003C\/div\u003E\n \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n \n \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2014\/12\/RTXXU1L-Xi.jpg.webp)\u0022\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/a\u003E\n\n \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003E\u003Cem\u003EOver the next few days,\u00a0\u003C\/em\u003ENet Politics\u003Cem\u003E\u00a0will countdown\u00a0the top five developments in cyber policy of 2014.\u00a0Each policy event will have its own post, explaining what happened, what it all means, and its impact on\u00a0cyber policy in\u00a02015. In this post, China\u2019s great leap forward in\u00a0cyber policy making.\u00a0\u003C\/em\u003E\n\n2014 was a year of major progress on the cyber policy front for China. Beijing reorganized and revitalized its policy making institutions at home, and it moved to shape the international agenda on the norms of behavior for cyberspace.\n\nIn February,\u00a0China announced the formation of new leading small group on network security and informatization, with Xi Jinping as its head. The creation of the group was important for at least three reasons. First, it was a signal of the growing importance of cyber to China\u2019s strategic, political, economic, diplomatic, and military interests. Or in the\u00a0phrasing of President Xi, \u0022No information security means no national security, no informatization means no modernization.\u0022 Second, it was an effort to bring greater coherence and coordination to cyber policy making. Five different ministries and bureaus\u2014the Ministry of Public Security, State Encryption Bureau, State Secrets Bureau, Ministry of State Security, Ministry of Industry and Information Technology\u2014plus the People\u2019s Liberation Army have a say in cybersecurity policy. The new group should be able to define priorities and resolve internal conflicts. Third,\u00a0it was part of Xi\u2019s efforts to consolidate power in his own hands. In addition to the network security group, Xi has established and leads a Central Leading Group for Overall Reform\u00a0and a new national security commission.\n\nIn November, China hosted the World Internet Conference. The conference was not free of mistakes; there was, for example, a rather ham-handed effort to slip a final declaration\u00a0under the doors of the delegates after midnight right before the conference closed. Yet the meeting in Wuzhen was a clear signal that China intends to take a more active role in defining the agenda for Internet governance. In particular, Beijing has stressed the norm of Internet sovereignty, the idea that every state has the right to make rules and regulations covering cyberspace, and that right should be recognized internationally. In other words, the global Internet should be subject to\u00a0local controls.\n\nThis confidence and assertiveness were also on display when\u00a0Lu Wei, head of China\u2019s Cyberspace Administration,\u00a0visited the United States just a few weeks after the conference ended. Lu spoke in Washington, but the highlight, at least for the Chinese press, was his visit to the West Coast. Lu rode in a driverless car at Google, met with Jeff Bezos of Amazon and Tim Cook of Apple, and visited Facebook, where Mark Zuckerberg told him he had read and shared copies of Xi Jinping\u2019s book, \u003Cem\u003EThe Governance of China\u003C\/em\u003E.\n\nIt remains to be seen whether China can convert these aspirations into realities in 2015. At home, it will have to move quickly to improve domestic cybersecurity. On the international stage, it will have to convert its new found activism into concrete policy recommendations. Still, the objective is clear: China intends on become a strong cyber power.\u003C\/div\u003E\n \n \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n \u003Cspan class=\u0022card-article-large__publication-type\u0022\u003EPost\u003C\/span\u003E\n \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby \u003Ca href=\u0022\/expert\/adam-segal\u0022 class=\u0022card-article-large__authors-link\u0022\u003EAdam Segal\u003C\/a\u003E\n \u003C\/span\u003E\n \n \n \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 29, 2014\u003C\/span\u003E\n \n \n \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n Net Politics\n \u003C\/a\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003Cdiv class=\u0022views-row\u0022\u003E\n \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n \n \u003Ca href=\u0022\/blog\/cyber-week-review-december-26-2014 \u0022 class=\u0022card-article-large__link\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n Cyber Week in Review: December 26, 2014\n \u003C\/div\u003E\n \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n \n \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2014\/12\/RTR4HPLO-Intereview-NK.jpg.webp)\u0022\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/a\u003E\n\n \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EHere is a quick round-up of this week\u2019s technology headlines and related\u00a0stories you may have missed:\n\n\n\n\tThe Sony hacking story continued to unfold. After President Obama said that the United States would respond proportionally to North Korean intrusion into Sony\u2019s networks in a time and manner of its choosing, North Korea unexpectedly lost all Internet connection. While some commentators drew a causal link between both events, there are\u00a0a\u00a0number of other reasons that could explain the outage.\u00a0Taking a step back from the whole Sony incident, David Sanger at the \u003Cem\u003ENew York Times\u003C\/em\u003E examines\u00a0the challenges facing the\u00a0United States when responding to state-backed cyber activity.\n\n\tThe German Federal Office for Information Security (BSI) announced that hackers infiltrated the networks of a German steel mill and caused the damage to the mill\u2019s blast furnace. The BSI said the hack could have been avoided had the industrial control systems that controlled the furnace not been connected to the Internet.\n\n\tFacebook was criticized in Russia for removing\u00a0a page on its website announcing a protest in Moscow organized by Alex Navalny, an opposition activist\u00a0currently under house arrest. Facebook took down the page at the request of Roskomnadzor, Russia\u2019s Internet regulator, which argued that it promoted an \u0022unsanctioned mass event.\u0022 Since Vladimir Putin\u2019s return to the presidency in 2012, Russia has tightened its controls on online expression.\n\n\tFollowing up on a story I mentioned two weeks ago,\u00a0the Irish government\u00a0backed Microsoft\u2019s claim that the United States\u00a0cannot compel the software giant\u00a0to hand over data held\u00a0on\u00a0its servers in Ireland without first seeking the Irish government\u2019s\u00a0permission. Microsoft, with the support of many of the IT industry and now the Irish government, is appealing a July ruling from\u00a0a U.S. court which compelled\u00a0it to provide data related to a drug case despite the fact that the data is held outside of the United States.\n\n\u003C\/div\u003E\n \n \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n \u003Cspan class=\u0022card-article-large__publication-type\u0022\u003EPost\u003C\/span\u003E\n \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby \u003Ca href=\u0022\/expert\/adam-segal\u0022 class=\u0022card-article-large__authors-link\u0022\u003EAdam Segal\u003C\/a\u003E\n \u003C\/span\u003E\n \n \n \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 26, 2014\u003C\/span\u003E\n \n \n \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n Net Politics\n \u003C\/a\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n\n\n\n\n\t\t \t \u003Cli class=\u0022views-row\u0022\u003E\n\t \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n Cybersecurity\n \u003C\/a\u003E\n \u003C\/div\u003E\n \n \u003Ca href=\u0022\/blog\/motohiro-tsuchiya-japan-ready-international-alliance-against-cyber-threats \u0022 class=\u0022card-article-large__link\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n Motohiro Tsuchiya: Japan is Ready for an International Alliance Against Cyber Threats\n \u003C\/div\u003E\n \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n \n \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2014\/12\/RTR3ME70-POTUS-Abe.jpg.webp)\u0022\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/a\u003E\n\n \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003E\u003Cem\u003EThis is a guest post by Motohiro Tsuchiya, a professor at Keio University, and a visiting scholar at the East-West Center.\u003C\/em\u003E\n\nJapan has watched the developing story of the cyber attacks against Sony Pictures Entertainment with great interest and a high degree of shock. While the company is American, Sony has Japanese origins and many Japanese citizens view the hack as if it happened to a Japanese company. The attack is a reminder of the hack of Sony\u2019s PlayStation Network in the spring of 2011, but its impact can be most accurately compared to the cyber incident that affected Mitsubishi Heavy Industries (MHI), Japan\u2019s biggest military contractor, in late 2011. That breach led to the large-scale theft of high-tech military information.\n\nSince the MHI case, many Japanese companies have become sensitized to the possible fallout of cyberattacks, particularly as nation states have begun to target private companies. This rarely happened in the Cold War era, but now seems a defining characteristic of cyberconflict. Many Japanese companies and government ministries have been victimized in various ways and some individuals have been mistakenly arrested due to faulty attribution.\n\nWhile this offers little comfort to Sony, it may be better for regional stability if the Democratic People\u2019s Republic of Korea (DPRK) becomes more reliant on cyber tools instead of kinetic attacks to promote its interests. Despite their harsh rhetoric, the DPRK leadership tends to be cautious in calculating the impact of their actions when they attack or criticize foreign countries. Launching a kinetic attack is much riskier and much more likely to\u00a0result in severe repercussions. The plausible deniability of cyberattacks and the use of proxies is an ideal alternative for Pyongyang.\n\nIn some cultures, particularly in the DPRK and China, information used to criticize or make fun of political leaders can be regarded as an especially threatening attack against authority and regime stability. Beijing, Pyongyang, and others consider criticism and satire as \u0022information attacks\u0022 and often use the term interchangeably with \u0022cyberattacks\u0022 when the information attacks are conveyed online. Through this lens, it is somewhat understandable that the DPRK used cyberattacks to protest a movie, the central plot of which is the assassination of Kim Jong-un, the supreme leader. The plots of Hollywood movies often revolve around the attempted assassination of American presidents, but it is quite rare for a movie to actually show the killing of a another country\u2019s sitting or former president. There seems little doubt that U.S. citizens would criticize a DPRK made film depicting the killing of President Obama, even if the movie would be protected as free speech in the United States. Sony\u00a0could have been more sensitive to the potential North Korean reaction, but it certainly does not justify the use of cyberattacks to disrupt the release of a movie.\n\n\u003Cstrong\u003EHow will Japan react?\u003C\/strong\u003E\n\nEven before the Sony hack became public, the Japanese Parliament was taking steps to reinforce cybersecurity. The National Diet passed the \u0022Cybersecurity Basic Law\u0022 in November 2014. In the Japanese system, a basic law usually sets the country\u2019s long-term strategic goal in a certain policy area. By passing the Cybersecurity Basic Law, the National Information Security Council acquired more authorities and strengthened its legal basis to oversee cybersecurity issues in Japan. The former Information Security Policy Council, which set cybersecurity policies across government and reported to Japan\u2019s chief bureaucrat, was renamed the Cybersecurity Strategic Headquarters, and now cooperates closely with the new Japanese National Security Council, chaired by the Japanese prime minister. The headquarters\u2019 mandate is broad, covering the setting of Japan\u2019s strategic goals for cyberspace, protecting critical infrastructure, raising public awareness, research and development, and\u00a0information sharing.\n\nThere is an international component of the Cybersecurity Basic Law. Article 23 requires Japan to contribute to international arrangements that improve its cybersecurity. Japan has held a series of cybersecurity meetings with Association of Southeast Asian Nations\u00a0and held its first meeting with the European Union\u00a0in October 2014. The Sony\u00a0hack came at a timely moment and will test Japan\u2019s new responsibilities.\n\nHowever, taking a hard line attitude towards the DPRK may complicate the ongoing bilateral challenges between Japan and the DPRK, including the discussion about the abduction of Japanese citizens. This, however, may not be how it plays out. The DPRK has traditionally sought to improve relations with Japan when tensions rise\u00a0with the United States, with the hope that Japan can insulate North Korea from U.S. pressure. The United States and Japan will need to work closely to maintain a delicate balance and to make sure Pyongyang does not open up space between their positions.\n\nAs Tokyo looks to host the\u00a0Olympic Games in 2020, organizers will need to be mindful of the impact that DPRK cyberattacks could have. Strengthening U.S.-Japanese cooperation in this area will not only provide a united front against the DRPK in the short term, but also seek to prepare for any contingencies that might occur during the Tokyo olympics.\u003C\/div\u003E\n \n \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n \u003Cspan class=\u0022card-article-large__publication-type\u0022\u003EPost\u003C\/span\u003E\n \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Guest Blogger for Net Politics\u003C\/span\u003E\n \n \n \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 23, 2014\u003C\/span\u003E\n \n \n \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n Net Politics\n \u003C\/a\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n\t \u003C\/li\u003E\n\t\t \t \u003Cli class=\u0022views-row\u0022\u003E\n\t \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n Cybersecurity\n \u003C\/a\u003E\n \u003C\/div\u003E\n \n \u003Ca href=\u0022\/blog\/will-china-pressure-north-korea-sony-hack \u0022 class=\u0022card-article-large__link\u0022\u003E\n \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n Will China Pressure North Korea on the Sony Hack?\n \u003C\/div\u003E\n \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n \n \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2014\/12\/RTR2CDWZ-China-NK-Border.jpg.webp)\u0022\u003E\u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/a\u003E\n\n \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EThe United States has reportedly asked the Chinese government for help with North Korea and cyberattacks. Most of North Korea\u2019s Internet traffic passes through China, and the \u003Cem\u003ENew York Times\u003C\/em\u003E quotes one administration official as saying,\u201cWhat we are looking for is a blocking action, something that would cripple their efforts to carry out attacks.\u201d\n\nThere are numerous reasons to be skeptical that Beijing is going to be forthcoming with this request. Discussions on cyber between the United States and China have been difficult ever since the United States indicted five People\u2019s Liberation Army\u00a0officers for hacking into U.S. companies. In October, Foreign Minister Yang Jiechi told Secretary of State John Kerry that Beijing was waiting for the United States\u00a0to \u0022take positive actions so as to create conditions for the restart of dialogue and cooperation between the two countries.\u0022 That positive action\u2014probably something on the indictments\u2014has not happened. While China does not approve of North Korean actions, it is sympathetic to the argument that \u003Cem\u003EThe Interview\u003C\/em\u003E was insulting to North Korea. The\u003Cem\u003E Global Times\u003C\/em\u003E said the movie was nothing for Hollywood or American society to be proud of, a result of \u0022senseless cultural arrogance.\u0022 Moreover, there is a long history of Beijing\u00a0going easier on\u00a0Pyongyang\u00a0than the United States would like, even if some Chinese analysts have grown tired of supporting the Kim Jong-un regime.\n\nToday\u2019s press reports reinforce the sense that China will not do much, though \u003Cem\u003EBloomberg\u003C\/em\u003E is reporting that China will start its own investigation of the hack. Officials\u00a0stated that China opposed cyberattacks\u00a0and would engage in \u0022constructive cooperation\u0022 with the international community, but said there was no proof North Korea was behind the Sony attacks. Foreign Ministry spokeswoman Hua Chunying said, \u0022We need sufficient evidence before drawing any conclusion.\u0022\u00a0\n\nThere is, however, a small glimmer of hope. In her statement, Hua stressed twice that China opposed \u0022cyberattacks launched by any country or individual by using facilities beyond its own national borders against a third country.\u0022 This is most likely a reference to the North Korean hackers reportedly\u00a0operating from China (here are pictures\u00a0of\u00a0the Chilbosan hotel in Shenyang\u00a0where members of Unit 121, North Korea\u2019s computer network operations team, are supposedly based). One of the newspapers owned by the \u003Cem\u003EPeople\u2019s Daily\u003C\/em\u003E ran an article today quoting a South Korean professor as saying Pyongyang had approximately one thousand\u00a0hackers in China, so the Chinese press at least is not categorically denying their existence.\n\nIn June 2013, China signed on to the report from the third UN Group of Government Experts (GGE) on\u00a0Developments in the Field of Information and Telecommunications in the Context of International Security.\u00a0The report affirms that \u201cinternational law, and in particular, the United Nations Charter\u201d applies to cyberspace and that states must do something about cyberattacks that come from within their territory. It also affirms, \u0022States should seek to ensure that their territories are\u00a0not used by non-State actors for unlawful use of ICTs [information and communication technologies].\u0022\n\nEver since the Chinese signed off on the GGE report, they have said little about international responsibility and much about national sovereignty. But the statement from the Foreign Ministry suggests some sensitivity to the norm and thus how Washington might structure its argument to Beijing. And while China not likely to close the Chilbosan anytime soon, they may have signaled to North Korea that it is a possibility. \u00a0 \u00a0\u003C\/div\u003E\n \n \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n \u003Cspan class=\u0022card-article-large__publication-type\u0022\u003EPost\u003C\/span\u003E\n \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby \u003Ca href=\u0022\/expert\/adam-segal\u0022 class=\u0022card-article-large__authors-link\u0022\u003EAdam Segal\u003C\/a\u003E\n \u003C\/span\u003E\n \n \n \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 22, 2014\u003C\/span\u003E\n \n \n \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n Net Politics\n \u003C\/a\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n\t \u003C\/li\u003E\n\t\u003C\/div\u003E\n\n \n\u003Cul class=\u0022js-pager__items pager\u0022 data-drupal-views-infinite-scroll-pager\u003E\n \u003Cli class=\u0022pager__item\u0022\u003E\n \u003Ca class=\u0022button\u0022 href=\u0022?page=1\u0022 title=\u0022Load more items\u0022 rel=\u0022next\u0022\u003ELoad More\u003C\/a\u003E\n \u003C\/li\u003E\n\u003C\/ul\u003E\n\n\n \n \n\n \n \n\u003C\/div\u003E\n\u003C\/div\u003E\n","settings":null}]